shoyo / acoustic-keyloggerLinks
Pipeline of a keylogging attack using just an audio signal and unsupervised learning.
☆147Updated 2 years ago
Alternatives and similar repositories for acoustic-keylogger
Users that are interested in acoustic-keylogger are comparing it to the libraries listed below
Sorting:
- Kernel exploitation technique☆575Updated last year
- Hash identification program.☆152Updated 3 years ago
- A targeted DNS cache poisoner☆120Updated 2 years ago
- Recovers pixelized text from images☆191Updated 3 years ago
- Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.☆298Updated 2 months ago
- 🎄 Messy Messenger client showing how to use the internal Messenger GraphQL API.☆42Updated 2 weeks ago
- markdown friendly page for my viewers☆1Updated 11 months ago
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆236Updated 2 months ago
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆298Updated 5 months ago
- ☆47Updated last year
- My solutions to the 2020 NSA Codebreaker Challenge☆75Updated 4 years ago
- Rainbow table generation & lookup tools. Make Rainbow Tables Great Again!☆203Updated 3 years ago
- ☆128Updated 2 years ago
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,140Updated last year
- A pure Python script to easily get a reverse shell☆51Updated 2 years ago
- ☆127Updated 6 years ago
- Password cracking research using the Have I Been Pwned (HIBP) dataset to evaluate the effectiveness of the PassGPT Large Language Model (…☆62Updated last year
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆237Updated 10 months ago
- Why not run micropython on your EMFI tool?☆598Updated 10 months ago
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆851Updated 3 months ago
- ☆204Updated 8 months ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly re…☆327Updated 2 years ago
- Artifacts to the ALPACA attack.☆60Updated 3 years ago
- The Django backend running RACTF wargame events.☆25Updated 6 months ago
- Binary Golf Examples and Resources☆255Updated 11 months ago
- Yet another Stego Tool☆385Updated last year
- Official and Community CTFd themes☆84Updated 2 years ago
- Use random bot scanning the internet to seed a Conways Game of Life running on a small LCD on my desk☆40Updated 4 years ago
- Steganography in chess games☆88Updated 3 years ago
- GIF displaying its own MD5 (hashquine)☆77Updated 5 years ago